Rubin KC
Skills
• Languages: Python, JavaScript, Bash, Powershell, OSQuery, Regex, Rest API, KQL, HTML and CSS,
• SIEM/SOAR: Splunk, Phantom, Cortex XDR, ELK stack, ArcSight, Sentinel, Devo, AlienVault USM, theHive
• Threat Hunting: Netwitness, Tanium, Securonix Snypr, Zeek, RITA, CrowdStrike Falcon, Yara Rules, Sigma Rules, Bluecoat Reporter, Jupyter Notebook
• Malware Analysis: PEStudio, Process Hacker, VirusTotal, Cuckoo Sandbox, ProcMon, Ghidra, Immunity Debugger, Volatility, IDA Pro
• Endpoint Tools: MDE, Symantec Endpoint Protection, Checkpoint Harmony Endpoint, Proofpoint Email Security, Tripwire, Carbon Black Bit9
• Machine Learning: TenserFlow, Pytorch, Pandas, Spark, scikit-learn, NLTK, Weka
• PAM/ IAM: CyberArk, HashiCorp Vault
• Offensive Security Tools: Metasploit, Nmap, Burp suite, hashcat, SQL map, john the ripper, Nessus, OpenVAS, Atomic Red Team, MITRE Caldera
• Ticketing System: BMC Remedy, ServiceNow, Jira
• Network Concepts:SMB, SMTP, SSH, FTP, IPSec, TCP/IP, IPS/IDS, firewall
• Windows: Server 2019 Configuration (DNS, DHCP, RADIUS, Active Directory), Microsoft Project, Visio, SharePoint, SCCM, and CMDB
• Other Tools and Skills: Ansible, VMware, Docker, Kubernetes, Postman, Forensic tools like Autopsy and FTK imager, Cloud Concepts on AWS, Azure, ITIL framework, Power BI, Power Automate, Agile/Scrum practices.
About
A lifelong learner and a passionate individual seeking Cybersecurity role to contribute my skills and experiences gained in the professional workplace and my studies.
Interests: Incident Response, Threat Hunting, Detection Engineering, Automation, Malware Analysis, Machine Learning